cr.yp.to: 2024.06.12: Bibliography keys The bibliography at the end of the paper "New directions in cryptography" has 14 entries, labeled "[1]" through "[14]". The numbers "1" through "14" are examples of bibliography keys. I'll abbreviate "bibliography key" as "bibkey" or just "key".
Jade Rubick - Managing a bottleneck team Feel like your team is the bottleneck? Learn how to address the challenges of managing a bottleneck team.
You might need a portable monitor I cover why as a one monitor kind of guy, I found a portable monitor essential - both for streaming and for debugging the home lab.
Efficient WaveRNN: Block Sparsity WaveRNN inference can be accelerated by using block-sparse weight matrices combined with specialized block-sparse matrix-vector multiplication kernels.
How System Requests Work and How to Add Your Own SysReq I needed to add a custom System Request (Sys Req or SysRq) to a linux kernel some time ago. While doing so, I dug deep into how it works and I thought I’d make a quick post about it. Here is a good SuperUser answer about what a SysRq is. You may also know...
textile-based electrochemical sensors an exploration on building wearable electrochemical sensors using textile-based materials.
Ripgrep integration Ripgrep integration, a walkthrough # The two pillars of fzf # The interactive terminal interface and the fuzzy matching algorithm are the two pillars of fzf. However, the usefulness of the latter is rather limited in a non-interactive environment. This is...
Small units of work that work Creating small git commits is a good development practice. Preferably, with a clear commit message as well. It simplifies code review and can help tell a cle...
W. Jason Gilmore It's never been easier than ever to buy a SaaS. This is what you should do to ensure you can effectively assume control upon acquisition.
Procrastination Is Destructive Procrastination is the thief of time. It's the enemy of progress. It's the silent dream killer. You continue to delay things until there is no time left. You...
Why Agents Fall Short Why doesn’t your agent work as well as a SWE-agent, even when you use the same LLM? And why is it not as simple to implement?
Stop thinking and start building 99% of businesses die before even being born. By giving it a real chance you're are already beating the odds.
Group chats rule the world Most of the interesting conversations in tech now happen in private group chats: Whatsapp, Telegram, Signal, small invite-only Discord groups. Being part of the right group chat can feel like having a peek at the kitchen of a restaurant but instead of foo...
Lock-free reference-counting a TLS slot using atomics, part 1 - The Old New Thing First, we do it with locks.
The .NET MAUI Extension for Visual Studio Code is now Generally Available - .NET Blog Start developing .NET MAUI apps with the GA Visual Studio Code extension today!
Elixir v1.17 released: set-theoretic types in patterns, calendar durations, and Erlang/OTP 27 support Elixir v1.17 released: set-theoretic types in patterns, calendar durations, and Erlang/OTP 27 support
Book Review: Architecting ASP.NET Core Applications - Coding Sonata This is a thorough review for a book that would be your ultimate resource to explore the world of architecture and Software design in .NET
Flameshot Flameshot is a free and open-source, cross-platform tool to take screenshots with many built-in features to save you time.
Why curl closes PRs on GitHub Contributors to the curl project on GitHub tend to notice the above sequence quite quickly: pull requests submitted do not generally appear as “merged” with its accompanying purple blob, instead they are said to be “closed”. This has been happening since ...
Using .NET Aspire eShop application to collect all the telemetry Integrate OpenTelemetry with .NET Aspire eShop and New Relic to enhance your application's telemetry and gain deep insights into performance and health.
5 Practical Ways to Add Polly to Your C# Application [2024] How can you make your .NET apps resilient? This article presents five ways to integrate Polly into your app to make it robust and reliable applications.
Sonar Webinar, end to end security of a web application I did a Webinar on application security with Denis Troller and Sonar. I would like to thank Sonar for this opportunity, I really enjoyed it and found doing this together with you really professiona…
Visual Studio 2022 - 17.10 Performance Enhancements - Visual Studio Blog Explore the latest Visual Studio 2022 update, version 17.10, featuring significant performance enhancements like faster Windows Forms designer loading, improved Razor colorization, quicker solution loading, and reduced DLL overhead. Discover how these upd...
How To Encrypt ASP.NET Core Route Parameters Uses ASP.NET Core interfaces to encrypt and decrypt route parameters
The Red Hat cloud native architecture solution patterns Being a software architect, I'm always looking for good resources that can help me design better solutions. One of these resources I can rec...
Export and Quantize Models like Llama-3-8B-Instruct with Model Builder for ONNX Runtime GenAI Previously in Phi-3-mini in 30 lines of C# with ONNX Runtime GenAI and Phi-3-vision in 50 lines of C# with ONNX Runtime GenAI I showed how easy it was to run small Phi-3 models locally in just a few lines of C#. In this blog post I show how you can export...
Silicon Valley’s Best Kept Secret: Founder Liquidity Ask most venture-backed founders why they get 10x more equity than employee #1, 100x more equity than employee #5, and 1000x more equity than employee #15, and you'll get the same answer: "I'M TAKING SO MUCH RISK, IT'S SO HARD TO START A COMPANY, I MADE A...
.NET MAUI All-in-One Templates Pack v5.6: NuGet CPM and Nightly Builds Support Firstly, .NET MAUI 9 Preview 5 has just been released. The changelog can be found here. Notably, a new Blazor Hybrid Web template has been introduced in this version. In short, this new template ab…